Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 21:33

General

  • Target

    b9f1afbbadfddaa99da1182adba1961d098f592a154b3f0e991139a20952d28a.exe

  • Size

    716KB

  • MD5

    13b93c3642655498792d2b52cce4aefd

  • SHA1

    a31d0716abfcbe6631b0ab80255d49f67e8d3658

  • SHA256

    b9f1afbbadfddaa99da1182adba1961d098f592a154b3f0e991139a20952d28a

  • SHA512

    bacdca02f91789ac1bf41508e8889bd54b78fdea296f3216d4143f911e77d1b9ad03564243e9858aa836c2a37e35e7d0bcd73fb3278541cb28dedec5531827e8

  • SSDEEP

    12288:90P/aK2vB+giJw/9Rrw0R1u4V/0YG3wx6EcJHUEhPUotFZr+1izHGNe8jKk34z:9kCKABZ/TwSfVcYG3K/cJHlnFR+IGNef

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9f1afbbadfddaa99da1182adba1961d098f592a154b3f0e991139a20952d28a.exe
    "C:\Users\Admin\AppData\Local\Temp\b9f1afbbadfddaa99da1182adba1961d098f592a154b3f0e991139a20952d28a.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4936
  • C:\Windows\System32\alg.exe
    C:\Windows\System32\alg.exe
    1⤵
    • Executes dropped EXE
    PID:1372

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\System32\alg.exe

          Filesize

          661KB

          MD5

          f8b563798430882a4edd183311e6e5be

          SHA1

          8367022646b1b3823079c5776ee664bfdbc72fdd

          SHA256

          7b0900fbc84f2e8200d44128ea479754e50e668b3e374a8b4ffc2d0fb5a1c244

          SHA512

          9d05df478ee173f23271bdda0283799c9cda29b0f25b9329798a47afc164bad836fb4090cfc9bde6a6d5e4b36ad9003722ea85ef5b6c1a890a48c1e412181295

        • memory/1372-14-0x0000000140000000-0x00000001400AA000-memory.dmp

          Filesize

          680KB

        • memory/1372-16-0x0000000140000000-0x00000001400AA000-memory.dmp

          Filesize

          680KB

        • memory/4936-0-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB

        • memory/4936-1-0x0000000000790000-0x00000000007F6000-memory.dmp

          Filesize

          408KB

        • memory/4936-6-0x0000000000790000-0x00000000007F6000-memory.dmp

          Filesize

          408KB

        • memory/4936-7-0x0000000000790000-0x00000000007F6000-memory.dmp

          Filesize

          408KB

        • memory/4936-15-0x0000000000400000-0x00000000004B8000-memory.dmp

          Filesize

          736KB